The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

International Women’s Day

International Women’s Day

International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to ...
How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.
Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Cybersecurity and endpoint management firm Tanium has appointed Satyen Desai as the new Regional Vice President for ASEAN, signalling the company’s continued push to expand its presence across one of the world’s fastest growing economies. Desai announced the move while attending Tanium’s global Sales Kickoff (SKO) in Dallas, describing the opportunity ...
What Einstein Would Say About AI

What Einstein Would Say About AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the ...
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues ...
AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...
Eliminating the Technical Debt Caused by AI-Assisted Software Development

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...
Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.
No results found.

In the News

Qualys TRU Research Finds Manual Remediation Can’t Keep up as Exploitation Hits ‘Negative One Day’

Qualys TRU Research Finds Manual Remediation Can’t Keep up as Exploitation Hits ‘Negative One Day’

Qualys, Inc. (NASDAQ: QLYS), a leading provider of cloud-based IT, security and compliance solutions, today released a new research report, The Broken Physics of Remediation, revealing how exploitation timelines are outpacing human-scale remediation, and why traditional patch metrics can no longer describe true business exposure. Conducted by the ...
GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security

GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security

Check Point WAF recognised for industry‑leading detection and a unified platform that protects modern web and AI‑driven applications with simplicity and speeds
Commvault Extends Enterprise Resilience to Structured and AI Data With Real-Time Governance Controls

Commvault Extends Enterprise Resilience to Structured and AI Data With Real-Time Governance Controls

Sydney, Australia – April 2026 – Commvault (NASDAQ: CVLT), a leader in unified resilience at enterprise scale, today announced an expansion of its data and AI security capabilities within Commvault Cloud, enabled through its recent acquisition of Satori. The enhancements extend data discovery, classification and risk assessment into structured data ...
Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

Sydney, April 7, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, is highlighting a disconnect between cloud adoption models in physical security and the governance and operational demands of large enterprises. Large organisations need to approach cloud adoption through the lens of governance, risk ...
Vulnetix Named Australia’s First GCVE Numbering Authority, Brings Real-time Vulnerability Intelligence Into AI Coding Workflows

Vulnetix Named Australia’s First GCVE Numbering Authority, Brings Real-time Vulnerability Intelligence Into AI Coding Workflows

Australian-owned cyber security company opens local developer community with free database access
Exabeam Confronts AI Insider Threats Extending Behaviour Detection and Response to OpenAI ChatGPT and Microsoft Copilot

Exabeam Confronts AI Insider Threats Extending Behaviour Detection and Response to OpenAI ChatGPT and Microsoft Copilot

Applies behaviour profiling and analytics to the digital workforce, giving security teams full visibility into how users and AI agents interact across the enterprise
Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region

Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region

Award signals strong momentum following strategic partnerships and reflect dedication to delivering top-tier SASE security solutions to help business and government customers navigate future of cloud and AI security
Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

A recent software supply chain attack involving the widely used axios npm package has been attributed to a suspected North Korean threat actor, underscoring growing concerns about the security of open-source ecosystems relied on by Australian organisations. According to the Google Threat Intelligence Group (GTIG), the attack is not connected to the ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This